Zone-Based Policy Firewall High Availability

Size: px
Start display at page:

Download "Zone-Based Policy Firewall High Availability"

Transcription

1 The feature enables you to configure pairs of devices to act as backup for each other. High availability can be configured to determine the active device based on a number of failover conditions. When a failover occurs, the standby device seamlessly takes over and starts forwarding traffic and maintaining a dynamic routing table. The feature supports active/active high availability, active/standby high availability, and asymmetric routing. Finding Feature Information, page 1 Prerequisites for, page 1 Restrictions for, page 2 Information About, page 2 How to Configure, page 11 Configuration Examples for, page 23 Feature Information for, page 30 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to An account on Cisco.com is not required. Prerequisites for Interfaces attached to a firewall must have the same redundant interface identifier (RII). The active and standby devices must have the same zone-based policy firewall configuration. The active and standby devices must run on an identical version of the Cisco software. The active and standby devices must be connected through a switch. 1

2 Restrictions for For asymmetric routing traffic to pass, you must configure the pass action for the class-default class. If you configure a zone pair between two LAN interfaces, ensure that you configure the same group (RG) on both interfaces. The zone pair configuration is not supported if LAN interfaces belong to different RGs. Restrictions for Asymmetric routing is not supported on interfaces that are a part of a group (RG). Asymmetric routing should not be used for load sharing of WAN links because very high asymmetric routing traffic can cause performance degradation of devices. A Layer 2 interface that is converted to a Layer 3 interface by using the no switchport command should not be used as a control link or a data link. In an active/active scenario, there should not be any traffic flow between the interfaces that are part of different RGs. For traffic flow between interfaces, both the interfaces should be part of the same zone or of a different zone with pass action configured between the zones. Multiprotocol Label Switching (MPLS) is not supported on asymmetric routing. Layer 7 inspection is not HA-aware. If Layer 7 inspection is enabled and the active RG goes down, only Layer 4 sessions will be synchronized to the standby RG; Layer 7 sessions have to be reestablished with the server. Zone-based policy firewall supports only Layer 4 protocol inspection with. VRFs are not supported and cannot be configured under ZBFW High Availability data and control interfaces. Configuring zone-based policy firewall high availability with NAT and NAT high availability with zone-based policy firewalls is not recommended. Information About Overview High availability enables network-wide protection by providing fast recovery from faults that may occur in any part of a network. High availability enables rapid recovery from disruptions to users and network applications. The zone-based policy firewall supports active/active and active/standby high availability failover and asymmetric routing. The active/active failover allows both devices involved in the failover to forward traffic simultaneously. When active/standby high availability failover is configured, only one of the devices involved in the failover handles the traffic at one time, while the other device is in a standby mode, periodically synchronizing session information from the active device. 2

3 Operation Asymmetric routing supports the forwarding of packets from a standby group to an active group for packet handling. If this feature is not enabled, the return TCP packets forwarded to the device that did not receive the initial synchronization (SYN) message are dropped because they do not belong to any known existing session. Operation You can configure pairs of devices to act as hot standby devices for each other. Redundancy is configured on an interface basis. Pairs of redundant interfaces are known as groups (RGs). An RG must be configured under the interface in order for the zone-based policy firewall to correctly replicate connections in a high availability setup. In order for the firewall to synchronize connections, an RG must be associated with an interface. Figure 1 depicts an active/standby load-sharing scenario. It shows how a group is configured for a pair of devices that has one outgoing interface. Figure 2 depicts an active/active load-sharing scenario. It shows how two groups are configured for a pair of devices that have two outgoing interfaces. In both cases, the redundant devices are joined by a configurable control link, a data synchronization link, and an interlink interface. The control link is used to communicate the status of the devices. The data synchronization link is used to transfer stateful information from the firewall and to synchronize the stateful database. The pairs of redundant interfaces are configured with the same unique ID number, known as the redundant interface identifier (RII). Asymmetric routing is supported as part of the firewall high availability. In a LAN-WAN scenario, where the return traffic enters standby devices, asymmetric routing is supported. To implement the asymmetric routing functionality, configure both the redundant devices with a dedicated interface (interlink interface) for asymmetric 3

4 Operation traffic. This dedicated interface will redirect the traffic coming to the standby WAN interface to the active device. Figure 1: Redundancy Group One Outgoing Interface Figure 2: Redundancy Group Configuration Two Outgoing Interfaces 4

5 Operation The status of group members is determined through the use of hello messages sent over the control link. If either of the devices do not respond to a hello message within a configurable amount of time, the software considers that a failure has occurred, and a switchover is initiated. To detect a failure in milliseconds, the control links run the failover protocol. You can configure the following parameters for hello messages: Active timer. Standby timer. Hello time The interval at which hello messages are sent. Hold time The amount of time before which the active or standby device is declared to be down. The hello time defaults to 3 seconds to align with the Hot Standby Router Protocol (HSRP), and the hold time defaults to 10 seconds. You can also configure these timers in milliseconds by using the timers hellotime msec command. To determine which pairs of interfaces are affected by the switchover, you must configure a unique ID for each pair of redundant interfaces. This ID is known as the RII that is associated with the interface. A switchover to the standby device can occur under other circumstances. Another factor that can cause a switchover is a priority setting that can be configured on each device. The device with the highest priority value will be the active device. If a fault occurs on either the active or the standby device, the priority of the device is decremented by a configurable amount, known as the weight. If the priority of the active device falls below the priority of the standby device, a switchover occurs and the standby device becomes the active device. This default behavior can be overridden by disabling the preemption attribute for the group. You can also configure each interface to decrease the priority when the Layer 1 state of the interface goes down. The priority that is configured overrides the default priority of a group. 5

6 Active/Active Failover Each failure event that causes a modification of a group s priority generates a syslog entry that contains a time stamp, the group that was affected, the previous priority, the new priority, and a description of the failure event cause. Another situation that can cause a switchover to occur is when the priority of a device or interface falls below a configurable threshold level. A switchover to the standby device occurs under the following circumstances: Power loss or a reload occurs on the active device (this includes crashes). The run-time priority of the active device goes down below that of the standby device. The run-time priority of the active device goes down below the configured threshold device. The group on the active device is reloaded manually by using the application reload group rg-number command. Two consecutive hello messages missed on any monitored interface forces the interface into testing mode. Both devices will verify the link status on the interface and then execute the following tests: Network activity test Address Resolution Protocol (ARP) test Broadcast ping test Active/Active Failover In an active/active failover configuration, both devices can process network traffic. Active/active failover generates virtual MAC (VMAC) addresses for interfaces in each group (RG). One device in an active/active failover pair is designated as the primary (active) device, and the other is designated as the secondary (standby) device. Unlike with active/standby failover, this designation does not indicate which device becomes active when both devices start simultaneously. Instead, the primary/secondary designation determines the following: The device that provides the running configuration to the failover pair when they start simultaneously. The device on which the failover RG appears in the active state when devices start simultaneously. Each failover RG in the configuration is configured with a primary or secondary device preference. You can configure both failover RGs to be in the active state on a single device and the standby failover RGs to be on the other device. You can also configure one failover RG to be in the active state and the other RG to be in the standby state on a single device. Active/Standby Failover Active/standby failover enables you to use a standby device to take over the functionality of a failed device. A failed active device changes to the standby state, and the standby device changes to the active state. The device that is now in the active state takes over IP addresses and MAC addresses of the failed device and starts processing traffic. The device that is now in the standby state takes over standby IP addresses and MAC addresses. Because network devices do not see any change in the MAC-to-IP address pairing, Address Resolution Protocol (ARP) entries do not change or time out anywhere on the network. 6

7 Asymmetric Routing Overview In an active/standby scenario, the main difference between two devices in a failover pair depends on which device is active and which device is a standby, namely which IP addresses to use and which device actively passes the traffic. The active device always becomes the active device if both devices start up at the same time (and are of equal operational health). MAC addresses of the active device are always paired with active IP addresses. Asymmetric Routing Overview Asymmetric routing occurs when packets from TCP or UDP connections flow in different directions through different routes. In asymmetric routing, packets that belong to a single TCP or UDP connection are forwarded through one interface in a group (RG), but returned through another interface in the same RG. In asymmetric routing, the packet flow remains in the same RG. When you configure asymmetric routing, packets received on the standby RG are redirected to the active RG for processing. If asymmetric routing is not configured, the packets received on the standby RG may be dropped. Asymmetric routing determines the RG for a particular traffic flow. The state of the RG is critical in determining the handling of packets. If an RG is active, normal packet processing is performed. In case the RG is in a standby state and you have configured asymmetric routing and the asymmetric-routing always-divert enable command, packets are diverted to the active RG. Use the asymmetric-routing always-divert enable command to always divert packets received from the standby RG to the active RG. 7

8 Asymmetric Routing Overview The figure below shows an asymmetric routing scenario with a separate asymmetric-routing interlink interface to divert packets to the active RG. Figure 3: Asymmetric Routing Scenario The following rules apply to asymmetric routing: 1:1 mapping exists between the interface identifier (RII) and the interface. 1:n mapping exists between the interface and an RG. (An asymmetric routing interface can receive traffic from and send traffic to multiple RGs. For a non asymmetric-routing interface (normal LAN interface), a 1:1 mapping exists between the interface and the RG.) 1:n mapping exists between an RG and applications that use it. (Multiple applications can use the same RG). 1:1 mapping exists between an RG and the traffic flow. The traffic flow must map only to a single RG. If a traffic flow maps to multiple RGs, an error occurs. 1:1 or 1:n mapping can exist between an RG and an asymmetric-routing interlink as long as the interlink has sufficient bandwidth to support all the RG interlink traffic. Asymmetric routing consists of an interlink interface that handles all traffic that is to be diverted. The bandwidth of the asymmetric-routing interlink interface must be large enough to handle all expected traffic that is to be diverted. An IPv4 address must be configured on the asymmetric-routing interlink interface, and the IP address of the asymmetric routing interface must be reachable from this interface. 8

9 WAN-LAN Topology Note We recommend that the asymmetric-routing interlink interface be used for interlink traffic only and not be shared with high availability control or data interfaces because the amount of traffic on the asymmetric-routing interlink interface could be quite high. WAN-LAN Topology In a WAN-LAN topology, two devices are connected through LAN interfaces on the inside and WAN interfaces on the outside. There is no control on the routing of return traffic received through WAN links. WAN links can be provided by the same service provider or different service providers. In most cases, WAN links are provided by different service providers. To utilize WAN links to the maximum, configure an external device to provide a failover. On LAN-based interfaces, a high availability virtual IP address is required to exchange client information and for faster failover. On WAN-based interfaces, the group id ip virtual-ip decrement value command is used for failover. LAN-LAN Topology In a LAN-LAN topology, all participating devices are connected to each other through LAN interfaces on both the inside and the outside. In this scenario, the traffic is often directed to the correct firewall if static routing is configured on the upstream or downstream devices to an appropriate virtual IP address. The dynamic routing configuration supported on LAN-facing interfaces must not introduce a dependency on routing protocol 9

10 Exclusive Virtual IP Addresses and Exclusive Virtual MAC Addresses convergence; otherwise, fast failover requirements will not be met. The figure below shows a LAN-LAN topology. Figure 4: LAN-LAN Scenario Exclusive Virtual IP Addresses and Exclusive Virtual MAC Addresses Virtual IP (VIP) addresses and virtual MAC (VMAC) addresses are used by security applications to control interfaces that receive traffic. An interface is paired with another interface, and these interfaces are associated with the same group (RG). The interface that is associated with an active RG exclusively owns the VIP and VMAC. The Address Resolution Protocol (ARP) process on the active device sends ARP replies for any ARP request for the VIP, and the Ethernet controller for the interface is programmed to receive packets destined for the VMAC. When an RG failover occurs, the ownership of the VIP and VMAC changes. The interface that is associated with the newly active RG sends a gratuitous ARP and programs the interface s Ethernet controller to accept packets destined for the VMAC. IPv6 Support You can assign each group (RG) on a traffic interface for both IPv4 and IPv6 virtual IP (VIP) addresses under the same interface identifier (RII). Each RG uses a unique virtual MAC (VMAC) address per RII. For an RG, the IPv6 link-local VIP and global VIP coexist on an interface. You can configure an IPv4 VIP, a link-local IPv6 VIP, and/or a global IPv6 VIP for each RG on a traffic interface. IPv6 link-local VIP is mainly used when configuring static or default routes, whereas IPv6 global VIP is widely used in both LAN and WAN topologies. You must configure a physical IP address before configuring an IPv4 VIP. 10

11 Virtual Fragmentation Reassembly Virtual Fragmentation Reassembly Virtual fragmentation reassembly (VFR) enables the firewall to create dynamic access control lists (ACLs) to protect the network from various fragmentation attacks. VFR is high availability-aware. When the firewall is enabled for high availability, fragmented packets that arrive on the standby group (RG) are redirected to the active group. Use the ip virtual-reassembly command to enable VFR on an interface. Note VFR should not be enabled on a device that is placed on an asymmetric path. The reassembly process requires all fragments within an IP datagram. Devices placed in the asymmetric path may not receive all IP fragments, and the fragment reassembly will fail. How to Configure Configuring Application Redundancy and Redundancy Application Groups SUMMARY STEPS 1. enable 2. configure terminal 3. parameter-map type inspect global log dropped-packets enable 6. exit application 9. group id 10. name group-name 11. preempt 12. priority value 13. control interface-type interface-number protocol id 14. data interface-type interface-number 15. asymmetric-routing interface type number 16. Configure Step 7 to Step 11 to create another group on the same device. 17. end 11

12 Configuring Application Redundancy and Redundancy Application Groups DETAILED STEPS Step 1 Step 2 Command or Action enable Device> enable configure terminal Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Device# configure terminal Step 3 parameter-map type inspect global Device(config)# parameter-map type inspect global Defines a global inspect parameter map and enters parameter-map type inspect configuration mode. Step 4 Enables firewall high availability. Step 5 Device(config-profile)# log dropped-packets enable Enables logging of packets dropped by the firewall. Step 6 Step 7 Device(config-profile)# log dropped-packets enable exit Device(config-profile)# exit Exits parameter-map type inspect configuration mode and returns to global configuration mode. Enters configuration mode. Step 8 Step 9 Device(config)# application Device(config-red)# application group id Device(config-red-app)# group 1 Configures application and enters application configuration mode. Configures a group and enters application group configuration mode. 12

13 Configuring a Firewall for High Availability Step 10 Command or Action name group-name Purpose Configures a group with a name. Step 11 Device(config-red-app-grp)# name RG1 preempt Enables preemption on the group. Step 12 Step 13 Device(config-red-app-grp)# preempt priority value Device(config-red-app-grp)# priority 230 control interface-type interface-number protocol id Device(config-red-app-grp)# control gigabitethernet 0/0/1 protocol 1 Specifies a group priority and a failover threshold value for a group. Configures the control interface type and number for a group. Step 14 data interface-type interface-number Device(config-red-app-grp)# data gigabitethernet 0/0/1 Configures the data interface type and number for a group. Step 15 asymmetric-routing interface type number Enables asymmetric routing on an interface. Device(config-red-app-grp)# asymmetric-routing interface gigabitethernet 0/0/1 Step 16 Step 17 Configure Step 7 to Step 11 to create another group on the same device. end Device(config-red-app-grp)# end Exits application group configuration mode and returns to privileged EXEC mode. Configuring a Firewall for High Availability In this task, you will do the following: Configure a firewall. Create a security source zone. 13

14 Configuring a Firewall for High Availability Create a security destination zone. Create a security zone pair by using the configured source and destination zones. Configure an interface as a zone member. SUMMARY STEPS 1. enable 2. configure terminal 3. class-map type inspect match-any class-map-name 4. match protocol protocol-name 5. exit 6. parameter-map type inspect global exit 9. policy-map type inspect policy-map-name 10. class type inspect class-map-name 11. inspect 12. exit 13. class class-default 14. drop 15. exit 16. exit 17. zone security zone-name 18. exit 19. zone security zone-name 20. exit 21. zone-pair security zone-pair-name source zone-name destination zone-name 22. service-policy type inspect policy-map-name 23. exit 24. zone-pair security zone-pair-name source zone-name destination zone-name 25. service-policy type inspect policy-map-name 26. exit 27. interface type number 28. ip address ip-address mask 29. encapsulation dot1q vlan-id 30. zone-member security security-zone-name 31. end 32. show policy-firewall session zone-pair ha 33. debug policy-firewall ha 14

15 Configuring a Firewall for High Availability DETAILED STEPS Step 1 Step 2 Command or Action enable Device> enable configure terminal Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Device# configure terminal Step 3 class-map type inspect match-any class-map-name Device(config)# class-map type inspect match-any cmap-l4-protocol Defines the class on which an action is to be performed and enters policy-map class configuration mode. Step 4 Step 5 Step 6 Step 7 match protocol protocol-name Device(config-cmap)# match protocol tcp exit Device(config-cmap)# exit parameter-map type inspect global Device(config)# parameter-map type inspect global Configures a match criterion for a class map on the basis of the specified protocol. Exits policy-map class configuration mode and returns to global configuration mode. Defines a global inspect parameter map and enters parameter-map type inspect configuration mode. Enables firewall high availability. Step 8 Step 9 Device(config-profile)# exit Device(config-profile)# exit policy-map type inspect policy-map-name Device(config)# policy-map type inspect pmap-l4-protocols Exits parameter-map type inspect configuration mode and returns to global configuration mode. Creates a protocol-specific inspect type policy map and enters policy-map configuration mode. 15

16 Configuring a Firewall for High Availability Step 10 Step 11 Command or Action class type inspect class-map-name Device(config-pmap)# class type inspect cmap-l4-protocol inspect Purpose Defines the class on which an action is to be performed and enters policy-map class configuration mode. Enables stateful packet inspection. Step 12 Step 13 Step 14 Device(config-pmap-c)# inspect exit Device(config-pmap-c)# exit class class-default Device(config-pmap)# class class-default drop Exits policy-map class configuration mode and returns to policy-map configuration mode. Configures the default class on which an action is to be performed and enters policy-map class configuration mode. Drops packets that are sent to a device. Step 15 Step 16 Step 17 Step 18 Device(config-pmap-c)# drop exit Device(config-pmap-c)# exit exit Device(config-pmap)# exit zone security zone-name Device(config)# zone security TWAN exit Device(config-sec-zone)# exit Exits policy-map class configuration mode and returns to policy-map configuration mode. Exits policy-map configuration mode and returns to global configuration mode. Creates a security zone and enters security zone configuration mode. You need two security zones to create a zone pair: a source and a destination zone. Exits security zone configuration mode and returns to global configuration mode. 16

17 Configuring a Firewall for High Availability Step 19 Step 20 Step 21 Command or Action zone security zone-name Device(config)# zone security DATA exit Device(config-sec-zone)# exit zone-pair security zone-pair-name source zone-name destination zone-name Purpose Creates a security zone and enters security zone configuration mode. You need two security zones to create a zone pair: a source and a destination zone. Exits security zone configuration mode and returns to global configuration mode. Creates a zone pair to which interfaces can be assigned and enters security zone-pair configuration mode. Step 22 Device(config)# zone-pair security zp-twan-data source TWAN destination data service-policy type inspect policy-map-name Attaches a firewall policy map to a zone pair. Step 23 Step 24 Device(config-sec-zone-pair)# service-policy type inspect pmap-l4-protocols exit Device(config-sec-zone)# exit zone-pair security zone-pair-name source zone-name destination zone-name Exits security zone-pair configuration mode and returns to global configuration mode. Creates a zone pair to which interfaces can be assigned and enters security zone-pair configuration mode. Step 25 Device(config)# zone-pair security zp-data-twan source DATA destination TWAN service-policy type inspect policy-map-name Attaches a firewall policy map to a zone pair. Step 26 Device(config-sec-zone-pair)# service-policy type inspect pmap-l4-protocols exit Device(config-sec-zone-pair)# exit Exits security zone pair configuration mode and returns to global configuration mode. 17

18 Configuring a Firewall for High Availability Step 27 Command or Action interface type number Purpose Configures an IP address for the subinterface. Step 28 Device(config)# interface gigabitethernet 0/0/0 ip address ip-address mask Configures an IP address for the subinterface. Step 29 Device(config-subif)# ip address encapsulation dot1q vlan-id Sets the encapsulation method used by the interface. Step 30 Step 31 Step 32 Step 33 Device(config-subif)# encapsulation dot1q 2 zone-member security security-zone-name Device(config-subif)# zone-member security private end Device(config-sec-zone-pair)# end show policy-firewall session zone-pair ha Device# show policy-firewall session zone-pair ha debug policy-firewall ha Configures the interface as a zone member. For the security-zone-name argument, you must configure one of the zones that you had configured by using the zone security command. When an interface is in a security zone, all traffic to and from that interface (except traffic going to the device or initiated by the device) is dropped by default. To permit traffic through an interface that is a zone member, you must make that zone part of a zone pair to which you apply a policy. If the policy permits traffic (via inspect or inspect actions), traffic can flow through the interface. Exits security zone pair configuration mode and returns to privileged EXEC mode. (Optional) Displays the firewall HA sessions pertaining to a zone pair. (Optional) Displays messages about firewall events. Device# debug policy-firewall ha 18

19 Configuring a Redundancy Application Group on a WAN Interface Configuring a Redundancy Application Group on a WAN Interface SUMMARY STEPS 1. enable 2. configure terminal 3. interface type number 4. description string 5. ip address ip-address mask 6. zone-member security zone-name 7. ip tcp adjust-mss max-segment-size 8. rii RII-identifier 9. asymmetric-routing enable 10. end DETAILED STEPS Step 1 Step 2 Command or Action enable Device> enable configure terminal Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Device# configure terminal Step 3 interface type number Device(config)# interface gigabitethernet 0/0/2.1 Configures a subinterface and enters subinterface configuration mode. Step 4 description string Adds a description to an interface configuration. Step 5 Device(config-subif)# description wan interface ip address ip-address mask Sets a primary or secondary IP address for an interface. Device(config-subif)# ip address

20 Configuring a Redundancy Application Group on a WAN Interface Step 6 Command or Action zone-member security zone-name Device(config-subif)# zone-member security TWAN Purpose Configures the interface as a zone member while configuring a firewall. For the zone-name argument, you must configure one of the zones that you had configured by using the zone security command. When an interface is in a security zone, all traffic to and from that interface (except traffic going to the router or initiated by the router) is dropped by default. To permit traffic through an interface that is a zone member, you must make that zone part of a zone pair to which you apply a policy. If the policy permits traffic (via inspect or pass actions), traffic can flow through the interface. Step 7 Step 8 Step 9 Step 10 ip tcp adjust-mss max-segment-size Device(config-subif)# ip tcp adjust-mss 1360 rii RII-identifier Device(config-subif)# rii 360 asymmetric-routing enable Device(config-subif)# asymmetric-routing enable end Device(config-subif)# end Adjusts the maximum segment size (MSS) value of TCP SYN packets going through a router. Configures an RII for group-protected traffic interfaces. Associates a group with an interface that is used for asymmetric routing. Exits subinterface configuration mode and enters privileged EXEC mode. 20

21 Configuring a Redundancy Application Group on a LAN Interface Configuring a Redundancy Application Group on a LAN Interface SUMMARY STEPS 1. enable 2. configure terminal 3. interface type number 4. description string 5. encapsulation dot1q vlan-id 6. ip vrf forwarding name 7. ip address ip-address mask 8. zone-member security zone-name 9. rii RII-identifier 10. group id ip ip-address exclusive 11. end DETAILED STEPS Step 1 Step 2 Command or Action enable Device> enable configure terminal Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Device# configure terminal Step 3 interface type number Device(config)# interface gigabitethernet 0/0/2.1 Configures a subinterface and enters subinterface configuration mode. Step 4 description string Adds a description to an interface configuration. Step 5 Device(config-subif)# description lan interface encapsulation dot1q vlan-id Sets the encapsulation method used by the interface. Device(config-subif)# encapsulation dot1q 18 21

22 Configuring a Redundancy Application Group on a LAN Interface Step 6 Step 7 Command or Action ip vrf forwarding name Device(config-subif)# ip vrf forwarding trust ip address ip-address mask Purpose Associates a VPN routing and forwarding (VRF) instance with an interface or subinterface. The command will not be configured if the specified VRF is not configured. Sets a primary or secondary IP address for an interface. Device(config-subif)# ip address Step 8 zone-member security zone-name Device(config-subif)# zone-member security data Configures the interface as a zone member. For the zone-name argument, you must configure one of the zones that you had configured by using the zone security command while configuring a firewall. When an interface is in a security zone, all traffic to and from that interface (except traffic going to the router or initiated by the router) is dropped by default. To permit traffic through an interface that is a zone member, you must make that zone part of a zone pair to which you apply a policy. If the policy permits traffic (via inspect or pass actions), traffic can flow through the interface. Step 9 Step 10 rii RII-identifier Device(config-subif)# rii 100 group id ip ip-address exclusive Configures an RII for group-protected traffic interfaces. Configures a virtual IP address for the group. Step 11 Device(config-subif)# group 1 ip exclusive end Device(config-subif)# end Exits subinterface configuration mode and enters privileged EXEC mode. 22

23 Configuration Examples for Configuration Examples for Zone-Based Policy Firewall High Availability Configuring Application Redundancy and Redundancy Application Groups configure terminal parameter-map type inspect global log dropped-packets enable application group 1 name RG1 preempt priority 230 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/1 asymmetric-routing gigabitethernet 0/0/1 Configuring a Firewall for High Availability configure terminal class-map type inspect match-any cmap-l4-protocol match protocol tcp parameter-map type inspect global policy-map type inspect pmap-l4-protocols class type inspect cmap-l4-protocol inspect class class-default drop zone security TWAN zone security DATA zone-pair security zp-twan-data source TWAN destination DATA service-policy type inspect pmap-l4-protocols zone-pair security zp-data-twan source DATA destination TWAN service-policy type inspect pmap-l4-protocols interface gigabitethernet 0/0/0 ip address encapsulation dot1q 2 zone member security private 23

24 Configuring a Redundancy Application Group on a WAN Interface Configuring a Redundancy Application Group on a WAN Interface The following example shows how to configure groups for a WAN-LAN scenario: interface gigabitethernet 0/0/2 description wan interface ip zone-member security TWAN ip tcp adjust-mss 1360 rii 360 asymmetric-routing enable The following is a sample WAN LAN active/active configuration in which two devices have two LAN interfaces and one WAN interface. Two groups (RG1 and RG2) are configured on each device, and LAN interfaces are bound to one group. The WAN link is shared by both the RGs. RG1 is active on Device 1 and RG2 is active on Device 2. Configuration on Device 1: application group 1 name RG1 priority 205 failover-threshold 200 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/2 asymmetric-routing gigabitethernet 0/0/3 group 2 name RG2 priority 195 failover-threshold 190 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/2 asymmetric-routing gigabitethernet 0/0/3 parameter-map type inspect global delay 10 class-map type inspect match-all ha-class match protocol tcp policy-map type inspect ha-policy class type inspect ha-class inspect class class-default drop zone security ha-in zone security ha-out zone-pair security ha-in-out source ha-in destination ha-out service-policy type inspect ha-policy interface pos 2/1 rii 210 decrement 100 asymmetric-routing enable zone-member security ha-out interface gigabitethernet 0/0 rii 1 1 ip exclusive decrement 50 zone-member security ha-in interface gigabitethernet 0/1 rii 2 24

25 Configuring a Redundancy Application Group on a WAN Interface 1 ip exclusive decrement 50 zone-member security ha-in Configuration on Device 2: application group 1 name RG1 priority 195 failover-threshold 190 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/2 asymmetric-routing gigabitethernet 0/0/3 group 2 name RG2 priority 205 failover-threshold 200 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/2 asymmetric-routing gigabitethernet 0/0/3 parameter-map type inspect global delay 10 class-map type inspect match-all ha-class match protocol tcp policy-map type inspect ha-policy class type inspect ha-class inspect class class-default drop zone security ha-in zone security ha-out zone-pair security ha-in-out source ha-in destination ha-out service-policy type inspect ha-policy interface pos 2/1 rii 210 decrement 100 asymmetric-routing enable zone-member security ha-out interface gigabitethernet 0/0 rii 1 1 ip exclusive decrement 50 zone-member security ha-in interface gigabitethernet 0/1 rii 2 2 ip exclusive decrement 50 zone-member security ha-in The following is a sample active/standby LAN-WAN configuration with one LAN interface and one WAN interface on each device. Only one group (RG1) is configured, and it is active on Device 1 and on the standby on Device 2. The VIP address is owned by the LAN interface of the active device. Configuration on Device 1 (active): application group 1 name RG1 priority 205 failover-threshold 200 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/2 asymmetric-routing gigabitethernet 0/0/3 25

26 Configuring a Redundancy Application Group on a WAN Interface parameter-map type inspect global delay 10 class-map type inspect match-all ha-class match protocol tcp policy-map type inspect ha-policy class type inspect ha-class inspect class class-default drop zone security ha-in zone security ha-out zone-pair security ha-in-out source ha-in destination ha-out service-policy type inspect ha-policy interface pos 2/1 rii 210 decrement 100 asymmetric-routing enable zone-member security ha-out interface gigabitethernet 0/0 rii 1 1 ip exclusive decrement 50 zone-member security ha-in Configuration on Device 2(standby): application group 1 name RG1 priority 195 failover-threshold 190 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/2 asymmetric-routing gigabitethernet 0/0/3 parameter-map type inspect global delay 10 class-map type inspect match-all ha-class match protocol tcp policy-map type inspect ha-policy class type inspect ha-class inspect class class-default drop zone security ha-in zone security ha-out zone-pair security ha-in-out source ha-in destination ha-out service-policy type inspect ha-policy interface pos 2/1 rii 210 decrement 100 asymmetric-routing enable zone-member security ha-out interface gigabitethernet 0/0 rii 1 26

27 Configuring a Redundancy Application Group on a LAN Interface 1 ip exclusive decrement 50 zone-member security ha-in Configuring a Redundancy Application Group on a LAN Interface interface gigabitethernet 0/0/2 description lan interface ip address zone member security data rii 100 group 1 ip exclusive The following is an active/active LAN-LAN configuration that has a device with two LAN interfaces for both upstream and downstream traffic. Two groups (RG1 and RG2) are configured on each device. The pairing for each LAN upstream and LAN downstream links exists, and each pair is made part of a single group. In this scenario, the VIP addresses and VMAC address ownership is exclusively restricted to the active interface and hence there is no possibility of asymmetric routing. Configuration on Device 1: application group 1 name RG1 priority 205 failover-threshold 200 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/2 group 2 name RG2 priority 195 failover-threshold 190 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/2 parameter-map type inspect global delay 10 class-map type inspect match-all ha-class match protocol tcp policy-map type inspect ha-policy class type inspect ha-class inspect class class-default drop zone security ha-in zone security ha-out zone-pair security ha-in-out source ha-in destination ha-out service-policy type inspect ha-policy interface gigabitethernet 0/0 rii 1 1 ip exclusive decrement 50 zone-member security ha-in interface gigabitethernet 0/1 rii 2 2 ip exclusive decrement 50 zone-member security ha-in interface gigabitethernet 1/0 rii 210 decrement

28 Configuring a Redundancy Application Group on a LAN Interface 1 ip exclusive decrement 50 zone-member security ha-out interface gigabitethernet 1/1 rii 110 decrement ip exclusive decrement 50 zone-member security ha-out Configuration on Device 2: application group 1 name RG1 priority 195 failover-threshold 190 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/2 group 2 name RG2 priority 205 failover-threshold 200 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/2 parameter-map type inspect global delay 10 class-map type inspect match-all ha-class match protocol tcp policy-map type inspect ha-policy class type inspect ha-class inspect class class-default drop zone security ha-in zone security ha-out zone-pair security ha-in-out source ha-in destination ha-out service-policy type inspect ha-policy interface gigabitethernet 0/0 rii 1 1 ip exclusive decrement 50 zone-member security ha-in interface gigabitethernet 0/1 rii 2 2 ip exclusive decrement 50 zone-member security ha-in interface gigabitethernet 1/0 rii 210 decrement ip exclusive decrement 50 zone-member security ha-out interface gigabitethernet 1/1 rii 110 decrement ip exclusive decrement 50 zone-member security ha-out The following is an active/standby LAN-LAN configuration. This configuration is similar to the active/standby WAN-LAN configuration in which each device has one LAN interface for both upstream and downstream 28

29 Configuring a Redundancy Application Group on a LAN Interface traffic. Only one group (RG1) is configured and each interface is made part of this group. Configuration on Device 1 (active): application group 1 name RG1 priority 205 failover-threshold 200 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/2 parameter-map type inspect global delay 10 class-map type inspect match-all ha-class match protocol tcp policy-map type inspect ha-policy class type inspect ha-class inspect class class-default drop zone security ha-in zone security ha-out zone-pair security ha-in-out source ha-in destination ha-out service-policy type inspect ha-policy interface gigabitethernet 0/0 rii 1 1 ip exclusive decrement 50 zone-member security ha-out interface gigabitethernet 1/0 rii 210 decrement ip exclusive decrement 50 zone-member security ha-out Configuration on Device 2(standby): application group 1 name RG1 priority 195 failover-threshold 190 control gigabitethernet 0/0/1 protocol 1 data gigabitethernet 0/0/2 parameter-map type inspect global delay 10 class-map type inspect match-all ha-class match protocol tcp policy-map type inspect ha-policy class type inspect ha-class inspect class class-default drop zone security ha-in 29

30 Feature Information for zone security ha-out zone-pair security ha-in-out source ha-in destination ha-out service-policy type inspect ha-policy interface gigabitethernet 0/0 rii 1 1 ip exclusive decrement 50 zone-member security ha-out interface gigabitethernet 1/0 rii 210 decrement ip exclusive decrement 50 zone-member security ha-out Feature Information for Zone-Based Policy Firewall High Availability The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to An account on Cisco.com is not required. Table 1: Feature Information for Feature Name Zone-Based Policy Firewall High Availability Releases 15.2(3)T Feature Information The feature enables you to configure pairs of routers to act as backup for each other. High availability (HA) can be configured to determine the active router based on a number of failover conditions. When a failover occurs, the standby router seamlessly takes over and starts forwarding traffic and maintaining a dynamic routing table. The Zone-Based Policy Firewall High Availability feature supports active/active HA, active/standby HA, and asymmetric routing. The following commands were introduced or modified: debug policy-firewall,, and show policy-firewall. 30

NAT Box-to-Box High-Availability Support

NAT Box-to-Box High-Availability Support The feature enables network-wide protection by making an IP network more resilient to potential link and router failures at the Network Address Translation (NAT) border. NAT box-to-box high-availability

More information

Configuring Stateful Interchassis Redundancy

Configuring Stateful Interchassis Redundancy The Stateful Interchassis Redundancy feature enables you to configure pairs of devices to act as backups for each other. This module describes conceptual information about and tasks for configuring stateful

More information

Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT

Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT The Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT feature supports the forwarding of packets from a standby

More information

Static NAT Mapping with HSRP

Static NAT Mapping with HSRP This module contains procedures for configuring Network Address Translation (NAT) to support the increasing need for highly resilient IP networks. This network resiliency is required where application

More information

Configuring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns

Configuring VRRP. Finding Feature Information. The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual routers to the VRRP routers on a LAN, allowing several routers on a

More information

Protection Against Distributed Denial of Service Attacks

Protection Against Distributed Denial of Service Attacks Protection Against Distributed Denial of Service Attacks The Protection Against Distributed Denial of Service Attacks feature provides protection from Denial of Service (DoS) attacks at the global level

More information

Sun RPC ALG Support for Firewalls and NAT

Sun RPC ALG Support for Firewalls and NAT The feature adds support for the Sun Microsystems remote-procedure call (RPC) application-level gateway (ALG) on the firewall and Network Address Translation (NAT). Sun RPC is an application layer protocol

More information

Sun RPC ALG Support for Firewalls and NAT

Sun RPC ALG Support for Firewalls and NAT The feature adds support for the Sun Microsystems remote-procedure call (RPC) application-level gateway (ALG) on the firewall and Network Address Translation (NAT). Sun RPC is an application layer protocol

More information

Enabling ALGs and AICs in Zone-Based Policy Firewalls

Enabling ALGs and AICs in Zone-Based Policy Firewalls Enabling ALGs and AICs in Zone-Based Policy Firewalls Zone-based policy firewalls support Layer 7 application protocol inspection along with application-level gateways (ALGs) and application inspection

More information

Nested Class Map Support for Zone-Based Policy Firewall

Nested Class Map Support for Zone-Based Policy Firewall Nested Class Map Support for Zone-Based Policy Firewall The Nested Class Map Support for Zone-Based Policy Firewall feature provides the Cisco IOS XE firewall the functionality to configure multiple traffic

More information

VRRPv3 Protocol Support

VRRPv3 Protocol Support Virtual Router Redundancy Protocol (VRRP) enables a group of routers to form a single virtual router to provide redundancy. The LAN clients can then be configured with the virtual router as their default

More information

Enabling ALGs and AICs in Zone-Based Policy Firewalls

Enabling ALGs and AICs in Zone-Based Policy Firewalls Enabling ALGs and AICs in Zone-Based Policy Firewalls Zone-based policy firewalls support Layer 7 application protocol inspection along with application-level gateways (ALGs) and application inspection

More information

Loose Checking Option for TCP Window Scaling in Zone-Based Policy Firewall

Loose Checking Option for TCP Window Scaling in Zone-Based Policy Firewall Loose Checking Option for TCP Window Scaling in Zone-Based Policy Firewall The Loose Checking Option for TCP Window Scaling in Zone-Based Policy Firewall feature disables the strict checking of the TCP

More information

Firewall Stateful Inspection of ICMP

Firewall Stateful Inspection of ICMP The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated

More information

First Hop Redundancy Protocols Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

First Hop Redundancy Protocols Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) First Hop Redundancy Protocols Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Configurable Number of Simultaneous Packets per Flow

Configurable Number of Simultaneous Packets per Flow Configurable Number of Simultaneous Packets per Flow In zone-based policy firewalls, the number of simultaneous packets per flow is restricted to 25 and packets that exceed the limit are dropped. The dropping

More information

Match-in-VRF Support for NAT

Match-in-VRF Support for NAT The feature supports Network Address Translation (NAT) of packets that communicate between two hosts within the same VPN routing and forwarding (VRF) instance. In intra-vpn NAT, both the local and global

More information

Object Tracking: IPv6 Route Tracking

Object Tracking: IPv6 Route Tracking The feature expands the Enhanced Object Tracking (EOT) functionality to allow the tracking of IPv6 routes. Finding Feature Information, page 1 Restrictions for, page 1 Information About, page 2 How to

More information

Configuring HSRP. Understanding HSRP CHAPTER

Configuring HSRP. Understanding HSRP CHAPTER CHAPTER 40 This chapter describes how to use Hot Standby Router Protocol (HSRP) on the Cisco ME 3400E Ethernet Access switch to provide routing redundancy for routing IP traffic without being dependent

More information

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management

IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 Firewall Support for Prevention of Distributed Denial of Service Attacks and Resource Management IPv6 zone-based firewalls support the Protection of Distributed Denial of Service Attacks and the Firewall

More information

IP Application Services Configuration Guide, Cisco IOS Release 15SY

IP Application Services Configuration Guide, Cisco IOS Release 15SY Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Configuring VRRP. Finding Feature Information. Contents

Configuring VRRP. Finding Feature Information. Contents Configuring VRRP First Published: May 2, 2005 Last Updated: July 30, 2010 The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility for one or more virtual

More information

Configuring HSRP. Finding Feature Information. Restrictions for HSRP

Configuring HSRP. Finding Feature Information. Restrictions for HSRP The Hot Standby Router Protocol (HSRP) is a First Hop Redundancy Protocol (FHRP) designed to allow for transparent failover of the first-hop IP device. HSRP provides high network availability by providing

More information

VLANs over IP Unnumbered SubInterfaces

VLANs over IP Unnumbered SubInterfaces The VLANs over IP Unnumbered Subinterfaces feature allows IP unnumbered interface support to be configured on Ethernet VLAN subinterfaces. This feature also provides support for DHCP on VLAN subinterfaces.

More information

Configuring Virtual Private LAN Services

Configuring Virtual Private LAN Services Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS

More information

SecBlade Firewall Cards Stateful Failover Configuration Examples

SecBlade Firewall Cards Stateful Failover Configuration Examples SecBlade Firewall Cards Stateful Failover Configuration Examples Keywords: Stateful failover, active/standby mode, active/active mode, data synchronization, traffic switchover Abstract: A network that

More information

IP Addressing: Fragmentation and Reassembly Configuration Guide

IP Addressing: Fragmentation and Reassembly Configuration Guide First Published: December 05, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

Configuring Firewall TCP SYN Cookie

Configuring Firewall TCP SYN Cookie The Firewall TCP SYN Cookie feature protects your firewall from TCP SYN-flooding attacks. TCP SYN-flooding attacks are a type of denial-of-service (DoS) attack. Usually, TCP synchronization (SYN) packets

More information

Hot Standby Router Protocol (HSRP): Frequently Asked Questions

Hot Standby Router Protocol (HSRP): Frequently Asked Questions Hot Standby Router Protocol (HSRP): Frequently Asked Questions Document ID: 9281 Contents Introduction Will the standby router take over if the active router LAN interface state is "interface up line protocol

More information

Object Groups for ACLs

Object Groups for ACLs The feature lets you classify users, devices, or protocols into groups and apply these groups to access control lists (ACLs) to create access control policies for these groups. This feature lets you use

More information

Configuring NAT for High Availability

Configuring NAT for High Availability Configuring NAT for High Availability Last Updated: December 18, 2011 This module contains procedures for configuring Network Address Translation (NAT) to support the increasing need for highly resilient

More information

VRF-Aware Cloud Web Security

VRF-Aware Cloud Web Security The feature adds virtual routing and forwarding (VRF) support to the Cisco Cloud Web Security configuration. VRF instances in IP-based networks enable a device to have multiple instances of the routing

More information

Configuring IP SLAs LSP Health Monitor Operations

Configuring IP SLAs LSP Health Monitor Operations Configuring IP SLAs LSP Health Monitor Operations This module describes how to configure an IP Service Level Agreements (SLAs) label switched path (LSP) Health Monitor. LSP health monitors enable you to

More information

Configuring IKEv2 Load Balancer

Configuring IKEv2 Load Balancer The IKEv2 Load Balancer feature provides support for enabling clusters of FlexVPN gateways and distributes incoming Internet Key Exchange Version 2 (IKEv2) connection requests among FlexVPN gateways. This

More information

IP Addressing: Fragmentation and Reassembly Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000)

IP Addressing: Fragmentation and Reassembly Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000) IP Addressing: Fragmentation and Reassembly Configuration Guide, Cisco IOS XE Release 3S (Cisco ASR 1000) Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Sun RPC ALG Support for Firewall and NAT

Sun RPC ALG Support for Firewall and NAT Sun RPC ALG Support for Firewall and NAT Last Updated: December 18, 2011 The Sun RPC ALG Support for Firewall and NAT feature adds support for the Sun Microsystems (Sun) Remote Procedure Call (RPC) Application

More information

GGSN Pooling Support for Firewalls

GGSN Pooling Support for Firewalls The feature enhances the General Packet Radio Switching (GPRS) Tunneling Protocol (GTP) feature by adding load balancing support. GTP supports the inspection of control traffic that is designated to a

More information

HSRP MD5 Authentication

HSRP MD5 Authentication Finding Feature Information, page 1 Information About, page 1 How to Configure, page 2 Configuration Examples for, page 8 Additional References, page 9 Feature Information for, page 10 Finding Feature

More information

standby arp gratuitous through track vrrp

standby arp gratuitous through track vrrp standby arp gratuitous, page 2 standby authentication, page 4 standby bfd, page 7 standby bfd all-interfaces, page 9 standby delay minimum reload, page 11 standby follow, page 13 standby ip, page 15 standby

More information

IGMP Proxy. Finding Feature Information. Prerequisites for IGMP Proxy

IGMP Proxy. Finding Feature Information. Prerequisites for IGMP Proxy This module describes how to configure IGMP proxy to enable a device to send an IGMP report to a specified destination IP address. Finding Feature Information, page 1 Prerequisites for, page 1 Information

More information

Configuring High Availability

Configuring High Availability The Cisco High Availability (HA) technology enable network-wide protection by providing quick recovery from disruptions that may occur in any part of a network. A network's hardware and software work together

More information

Configuring Routes on the ACE

Configuring Routes on the ACE CHAPTER2 This chapter describes how the ACE is considered a router hop in the network when it is in routed mode. In the Admin or user contexts, the ACE supports static routes only. The ACE supports up

More information

BGP NSF Awareness. Finding Feature Information

BGP NSF Awareness. Finding Feature Information Nonstop Forwarding (NSF) awareness allows a device to assist NSF-capable neighbors to continue forwarding packets during a Stateful Switchover (SSO) operation. The feature allows an NSF-aware device that

More information

Completing Interface Configuration (Transparent Mode)

Completing Interface Configuration (Transparent Mode) CHAPTER 9 Completing Interface Configuration (Transparent Mode) This chapter includes tasks to complete the interface configuration for all models in transparent firewall mode. This chapter includes the

More information

IPv6 Snooping. Finding Feature Information. Restrictions for IPv6 Snooping

IPv6 Snooping. Finding Feature Information. Restrictions for IPv6 Snooping The feature bundles several Layer 2 IPv6 first-hop security features, including IPv6 neighbor discovery inspection, IPv6 device tracking, IPv6 address glean, and IPv6 binding table recovery, to provide

More information

Configuring IP SLAs ICMP Echo Operations

Configuring IP SLAs ICMP Echo Operations This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices

More information

Configuring VIP and Virtual Interface Redundancy

Configuring VIP and Virtual Interface Redundancy CHAPTER 6 Configuring VIP and Virtual Interface Redundancy This chapter describes how to plan for and configure virtual IP (VIP) redundancy and virtual interface redundancy on the CSS. Information in this

More information

MPLS over GRE. Finding Feature Information. Prerequisites for MPLS VPN L3VPN over GRE

MPLS over GRE. Finding Feature Information. Prerequisites for MPLS VPN L3VPN over GRE The feature provides a mechanism for tunneling Multiprotocol Label Switching (MPLS) packets over a non-mpls network. This feature utilizes MPLS over generic routing encapsulation (MPLSoGRE) to encapsulate

More information

Spanning Tree Protocol

Spanning Tree Protocol For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1

More information

Bulk Logging and Port Block Allocation

Bulk Logging and Port Block Allocation The feature allocates a block of ports for translation instead of allocating individual ports. This feature is supported only in carrier-grade Network Address Translation (CGN) mode. This module provides

More information

Configuring the Cisco IOS DHCP Relay Agent

Configuring the Cisco IOS DHCP Relay Agent All Cisco devices that run Cisco software include a DHCP server and the relay agent software. A DHCP relay agent is any host or IP device that forwards DHCP packets between clients and servers. This module

More information

Split DNS. Finding Feature Information

Split DNS. Finding Feature Information The feature enables a Cisco device to respond to Domain Name System (DNS) queries using a specific configuration and associated host table cache that are selected based on certain characteristics of the

More information

Configuring Failover. Understanding Failover CHAPTER

Configuring Failover. Understanding Failover CHAPTER CHAPTER 14 This chapter describes the security appliance failover feature, which lets you configure two security appliances so that one takes over operation if the other one fails. The ASA 5505 series

More information

Configuring Interfaces (Transparent Mode)

Configuring Interfaces (Transparent Mode) 8 CHAPTER This chapter includes tasks to complete the interface configuration in transparent firewall mode. This chapter includes the following sections: Information About Completing Interface Configuration

More information

Configuring Static and Dynamic NAT Translation

Configuring Static and Dynamic NAT Translation This chapter includes the following sections: Network Address Translation Overview, on page 1 Information About Static NAT, on page 2 Dynamic NAT Overview, on page 3 Timeout Mechanisms, on page 3 NAT Inside

More information

ACL Syslog Correlation

ACL Syslog Correlation The Access Control List (ACL) Syslog Correlation feature appends a tag (either a user-defined cookie or a device-generated MD5 hash value) to access control entry (ACE) syslog entries. This tag uniquely

More information

Configuring IP SLAs ICMP Echo Operations

Configuring IP SLAs ICMP Echo Operations This module describes how to configure an IP Service Level Agreements (SLAs) Internet Control Message Protocol (ICMP) Echo operation to monitor end-to-end response time between a Cisco router and devices

More information

Configuring the Cisco IOS DHCP Server

Configuring the Cisco IOS DHCP Server Cisco devices running Cisco software include Dynamic Host Configuration Protocol (DHCP) server and the relay agent software. The Cisco IOS DHCP server is a full DHCP server implementation that assigns

More information

Hardware Compatibility Matrix for Cisco cbr Series Routers

Hardware Compatibility Matrix for Cisco cbr Series Routers feature is introduced to allows the mobility CPE devices to move between cable modems with as less disruption of traffic as possible. Finding Feature Information Your software release may not support all

More information

through ftp-map Commands

through ftp-map Commands CHAPTER 12 12-1 email Chapter 12 email To include the indicated email address in the Subject Alternative Name extension of the certificate during enrollment, use the email command in crypto ca trustpoint

More information

Configuring NSF-OSPF

Configuring NSF-OSPF This module describes how to configure Nonstop Forwarding (NSF) in Cisco software to minimize the duration for which a network is unavailable to its users after a switchover. The main objective of NSF

More information

DHCP Server RADIUS Proxy

DHCP Server RADIUS Proxy The Dynamic Host Configuration Protocol (DHCP) Server RADIUS Proxy is a RADIUS-based address assignment mechanism in which a DHCP server authorizes remote clients and allocates addresses based on replies

More information

Lab Configuring HSRP and GLBP Topology

Lab Configuring HSRP and GLBP Topology Topology 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1

More information

Information about Network Security with ACLs

Information about Network Security with ACLs This chapter describes how to configure network security on the switch by using access control lists (ACLs), which in commands and tables are also referred to as access lists. Finding Feature Information,

More information

Configuring StackWise Virtual

Configuring StackWise Virtual Finding Feature Information, page 1 Restrictions for Cisco StackWise Virtual, page 1 Prerequisites for Cisco StackWise Virtual, page 2 Information About Cisco Stackwise Virtual, page 2 Cisco StackWise

More information

Split DNS. Finding Feature Information

Split DNS. Finding Feature Information The feature enables a Cisco device to respond to Domain Name System (DNS) queries using a specific configuration and associated host table cache that are selected based on certain characteristics of the

More information

H-VPLS N-PE Redundancy for MPLS Access

H-VPLS N-PE Redundancy for MPLS Access The feature enables two network provider edge (N-PE) devices to provide failover services to a user provider edge (U-PE) device in a hierarchical virtual private LAN service (H-VPLS). Having redundant

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module High Availability Configuration Guide Part number: 5998-2687 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company,

More information

Configuring IPv4 Broadcast Packet Handling

Configuring IPv4 Broadcast Packet Handling Configuring IPv4 Broadcast Packet Handling This module explains what IPv4 broadcast packets are, when they are used, and how to customize your router s configuration for situations when the default behavior

More information

Implementing Traffic Filters for IPv6 Security

Implementing Traffic Filters for IPv6 Security Implementing Traffic Filters for IPv6 Security Last Updated: November 14, 2011 This module describes how to configure Cisco IOS XE IPv6 traffic filter and firewall features for your Cisco networking devices.

More information

Zone-Based Policy Firewalls

Zone-Based Policy Firewalls This module describes the Cisco unidirectional firewall policy between groups of interfaces known as zones. Prior to the release of the Cisco unidirectional firewall policy, Cisco firewalls were configured

More information

PIX Security Appliance Contexts, Failover, and Management

PIX Security Appliance Contexts, Failover, and Management CHAPTER 8 PIX Security Appliance Contexts, Failover, and Management Upon completion of this chapter, you should be able to answer the following questions: How do I configure a Pix Security Appliance to

More information

How to Create an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values,

How to Create an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values, Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values This module describes how to use an IP access list to filter IP packets that contain certain IP Options, TCP

More information

Prerequisites for Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports

Prerequisites for Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports Creating an IP Access List to Filter IP Options, TCP Flags, Noncontiguous Ports This module describes how to use an IP access list to filter IP packets that contain certain IP Options, TCP flags, noncontiguous

More information

Configuring Routed Pseudowire and VPLS

Configuring Routed Pseudowire and VPLS Routed Pseudowire and VPLS feature routes Layer 3 traffic and Layer 2 frames for pseudowire connections between provider edge (PE) devices using Virtual Private LAN Services (VPLS) multipoint PE. Prerequisites

More information

Bidirectional Forwarding Detection

Bidirectional Forwarding Detection Bidirectional Forwarding Detection This document describes how to enable the Bidirectional Forwarding Detection (BFD) protocol. BFD is a detection protocol designed to provide fast forwarding path failure

More information

Resilient Ethernet Protocol (REP)

Resilient Ethernet Protocol (REP) The is a Cisco proprietary protocol that provides an alternative to the Spanning Tree Protocol (STP). REP provides a way to control network loops, handle link failures, and improve convergence time. It

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels Configuring Virtual Port Channels This chapter describes how to configure virtual port channels (vpcs) on Cisco Nexus 5000 Series switches. It contains the following sections: Information About vpcs, page

More information

Configuring IP Unicast Routing

Configuring IP Unicast Routing Finding Feature Information, page 2 Information About, page 2 Information About IP Routing, page 2 How to Configure IP Routing, page 9 How to Configure IP Addressing, page 10 Monitoring and Maintaining

More information

Configuring IP Services

Configuring IP Services This module describes how to configure optional IP services. For a complete description of the IP services commands in this chapter, refer to the Cisco IOS IP Application Services Command Reference. To

More information

Implementing NAT-PT for IPv6

Implementing NAT-PT for IPv6 Implementing NAT-PT for IPv6 Last Updated: August 1, 2012 Network Address Translation--Protocol Translation (NAT-PT) is an IPv6 to IPv4 translation mechanism, as defined in RFC 2765 and RFC 2766, allowing

More information

Configuring IEEE 802.3ad Link Bundling and Load Balancing

Configuring IEEE 802.3ad Link Bundling and Load Balancing Configuring IEEE 802.3ad Link Bundling and Load Balancing This document describes how the IEEE 802.3ad link bundling and load balancing leverages the EtherChannel infrastructure within Cisco software to

More information

Metadata Configuration Guide Cisco IOS Release 15M&T

Metadata Configuration Guide Cisco IOS Release 15M&T Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 2014 Cisco Systems, Inc. All rights

More information

Table below shows the hardware compatibility prerequisites for this feature.

Table below shows the hardware compatibility prerequisites for this feature. First Published: February 18, 2014 Cisco IOS 12.2(33)SCH2 introduces the feature, which allows the mobility CPE devices to move between cable modems with as less disruption of traffic as possible. Finding

More information

Per-Flow Admission. Finding Feature Information. Prerequisites for Per-Flow Admission

Per-Flow Admission. Finding Feature Information. Prerequisites for Per-Flow Admission The feature provides explicit controls to limit packet flow into a WAN edge in order to protect already admitted flows on the routing/wan edge. Finding Feature Information, page 1 Prerequisites for, page

More information

Configuring OSPF TTL Security Check and OSPF Graceful Shutdown

Configuring OSPF TTL Security Check and OSPF Graceful Shutdown Configuring OSPF TTL Security Check and OSPF Graceful Shutdown This module describes configuration tasks to configure various options involving Open Shortest Path First (OSPF). This module contains tasks

More information

Multicast only Fast Re-Route

Multicast only Fast Re-Route (MoFRR) is an IP solution that minimizes packet loss in a network when there is a link or node failure. It works by making simple enhancements to multicast routing protocols like Protocol Independent Multicast

More information

Monitoring and Maintaining ARP Information

Monitoring and Maintaining ARP Information Monitoring and Maintaining ARP Information Last Updated: October 15, 2012 The Monitoring and Maintaining ARP Information feature document describes the practices involved in monitoring and maintaining

More information

Configuring Routing Information Protocol

Configuring Routing Information Protocol Configuring Routing Information Protocol Last Updated: October 25, 2011 Routing Information Protocol (RIP) is a commonly used routing protocol in small to medium TCP/IP networks. It is a stable protocol

More information

IPv6 Multicast: PIM Sparse Mode

IPv6 Multicast: PIM Sparse Mode IPv6 multicast provides support for intradomain multicast routing using PIM sparse mode (PIM-SM). PIM-SM uses unicast routing to provide reverse-path information for multicast tree building, but it is

More information

Configuring Static and Dynamic NAT Translation

Configuring Static and Dynamic NAT Translation This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 4 Timeout Mechanisms, page 4 NAT Inside and Outside

More information

Configuring NAT for IP Address Conservation

Configuring NAT for IP Address Conservation This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

Configuring Resilient Ethernet Protocol

Configuring Resilient Ethernet Protocol This chapter describes Resilient Ethernet Protocol (REP), REP configuration guidelines, VLAN load balancing, REP timers, and REP over EVC. This chapter also describes procedures to configure REP. Understanding

More information

BFD on BDI Interfaces

BFD on BDI Interfaces The Cisco feature alleviates limitations on the maximum number of interfaces per system that switched virtual interfaces (SVI) impose. This document describes how to configure the Bidirectional Forwarding

More information

EVC Quality of Service

EVC Quality of Service This document contains information about how to enable quality of service (QoS) features (such as traffic classification and traffic policing) for use on an Ethernet virtual circuit (EVC). An EVC as defined

More information

NetFlow and NetFlow Data Export.

NetFlow and NetFlow Data Export. Getting Started with Configuring Cisco IOS NetFlow and NetFlow Data Export This module contains the minimum amount of information about and instructions necessary for configuring NetFlow to capture and

More information

IPv6 Multicast: PIM Sparse Mode

IPv6 Multicast: PIM Sparse Mode Finding Feature Information, page 1 Information About IPv6 Multicast PIM Sparse Mode, page 1 How to Configure IPv6 Multicast PIM Sparse Mode, page 6 Configuration Examples for IPv6 Multicast PIM Sparse

More information

Flexible NetFlow IPv6 Unicast Flows

Flexible NetFlow IPv6 Unicast Flows The feature enables Flexible NetFlow to monitor IPv6 traffic. Finding Feature Information, page 1 Information About Flexible NetFlow IPv6 Unicast Flows, page 1 How to Configure Flexible NetFlow IPv6 Unicast

More information

IPv6 Snooping. Finding Feature Information. Restrictions for IPv6 Snooping

IPv6 Snooping. Finding Feature Information. Restrictions for IPv6 Snooping The feature bundles several Layer 2 IPv6 first-hop security features, including IPv6 neighbor discovery inspection, IPv6 device tracking, IPv6 address glean, and IPv6 binding table recovery, to provide

More information

Zone-Based Policy Firewalls

Zone-Based Policy Firewalls This module describes the Cisco unidirectional firewall policy between groups of interfaces known as zones. Prior to the release of the Cisco unidirectional firewall policy, Cisco firewalls were configured

More information